We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
www.RocketRevise.com
4 Acake factory uses machines to make cakes.
(a) Complete the following descriptions of types of system. Write the correct missing term in the
spaces.
‘The factory uses a .. system to record data such as the number
of cakes being produced each hour.
When the data collected from sensors are analysed and used as
nnn BIS Onn System. One example
of this system, used in the factory, is to maintain a constant temperature in the ovens. It uses
a 10 measure the values. 4
(b) Cake mixture is mixed in a large pot. A conveyor belt moves the cake tins beneath the pot.
‘The conveyor belt stops and a set quantity of the cake mixture fills the cake tin. The conveyor
belt then moves and another cake tin is positioned beneath the pot.
Explain how the control system will ensure the correct amount of mixture is placed in the cake
tins.
www.RocketRevise.comwww.RocketRevise.com
(c) The cake factory has servers that store its confidential recipes and control the factory
‘machines.
Describe the implications of a hacker gaining access to the cake factory's servers.
1
i) Explain how the company could protect its data against hackers.
1
www.RocketRevise.comwww.RocketRevise.com
(d) The machines have a counter to record the number of cake tins filled. Each time a cake tin
is filled, the counter is increased by 1. The value is stored in an 8-bit register and the current
value is shown.
ofojo}1tfo}ol1
(i) Show the value of the binary number after another five cake tins have been filled.
fy
(ii) The following table shows some assembly language instructions for a processor which
hhas one general purpose register, the Accumulator (ACC).
Instruction Explanation
Opcode | Operand
AND | #n Bitwise AND operation of the contents of ACC with the
‘operand
AND | | Bitwise AND operation of the contents of ACC with the
contents of
xoR | #n Bitwise XOR operation of the contents of ACC with the
‘operand
xOR | | Bitwise XOR operation of the contents of ACC with the
contents of
or | #n Bitwise OR operation of the contents of ACC with the
‘operand
OR | | Bitwise OR operation of the contents of ACC with the
contents of
LsL| #n Bits in ACC are shifted logically n places to the left. Zeros
are introduced on the right hand end
LSR | #n Bits in ACC are shifted logically n places to the right. Zeros
are introduced on the left hand end
At the end of each day, the register is reset to 0.
Write the assembly language statement to reset the register to 0.
www.RocketRevise.comwww.RocketRevise.com
(iii) A two-place logical shift to the left is performed on the binary number shown in
part (a)
Show the result of this logical shift
a
(iv) State the mathematical result of a one-place logical shift to the right on a binary
number,
a
(e) The factory servers run software that makes use of Artificial Intelligence (Al).
Explain how the use of Al can help improve the safety and efficiency of the factory.
B31
www.RocketRevise.comwww.RocketRevise.com
Each of the following algorithms performs data validation,
State the type of validation check that each of the algorithms performs.
(a)
INPUT x
IF x <0 OR x > 10 THEN
ourpuT "Invalid"
ENDIF
(1
(b)
INPUT x
IF x = "" THEN
OUTPUT "Invalid"
ENDIF
a
()
INPUT x
IF NOT(x = "Red" OR x = "Yellow" OR x = “Blue") THEN
ourpUT "Invalia’
ENDIF
(1
www.RocketRevise.comwww.RocketRevise.com
company has several security measures in place to prevent unauthorised access to the data on
its computers.
(a) Describe the difference between the security and privacy of data.
(2)
(b) Each employee has a username and password to allow them to log onto a computer, An
employee's access rights to the data on the computers is set to either read-only, or read and
write,
Identify one other software-based measure that could be used to restrict the access to the
data on the computers.
(c)_ The company is also concerned about threats posed by networks and the internet
Identify two threats to the data that are posed by networks and the internet.
Threat 1.
Threat 2 ..
2)
www.RocketRevise.comwww.RocketRevise.com
Xanthe wants to maintain the integrity and security of data stored on her computer.
(a) Explain the difference between data security and data integrity.
(2)
(b) Xanthe uses both data validation and data verification when entering data on her computer.
Describe how data validation helps to protect the integrity of the data. Give an example
in your answer.
Desoription ....
Example
i
Describe how data verification helps to protect the integrity of the data. Give an example
in your answer.
Description (
Example ....
(2)
(c)_ Two malware threats are spyware and viruses.
Give two similarities and one difference between spyware and a virus.
Similarity 1.
Similarity 2 .
Difference .....
(3)
[Turn over.
www.RocketRevise.comwww.RocketRevise.com
‘When designing computer systems, itis important to consider the security, integrity and privacy of
the data
Draw one line from each measure to indicate whether it keeps data secure or protects th
of data,
Measure
| Firewall
| Double entry
Presence check
Data Security
Data Integrity
Password
(2
www.RocketRevise.comwww.RocketRevise.com
3. Ateacher is writing examination papers on a laptop computer. The computer is connected to the
internet. The teacher is concemed about the security and privacy of the papers.
(a) State the difference between the security of data and the privacy of data.
a
(b) Identify and describe two threats to the data. Identify one security measure to protect against
each threat. Each security measure must be different.
Threat 1 ..
Description ..
Security measure
Threat 2
Description J
Security measure ¢
(6)
www.RocketRevise.comwww.RocketRevise.com
Aschool stores personal data about its staff and students on its computer system.
(a) Explain why the school needs to keep both its data and its computer system secure from
unauthorised access.
Data
Computer system
(2)
(b) Complete the table by identifying two security threats to the data on a computer.
Describe each threat.
Give a different prevention method for each threat.
Prevention
method
Threat Description
(6)
(c)_ Data is encrypted when it is transmitted within the school network, or externally such as. over
the internet.
Describe what is meant by encryption and explain why itis used.
(2)
[Turn over.
www.RocketRevise.comwww.RocketRevise.com
5 A. company wants to store data about its employees in a computer system. The owner of the
company wants to ensure the security and integrity of the data
(a) (i) State why data needs to be kept secure.
fo}
i) One way the data stored in a computer can be kept secure is by using back-up software.
Give two other ways the data stored in a computer can be kept secure.
1.
2)
(b) The data about the employees is currently stored on paper. The data needs to be transferred
into the computer system,
Data validation and verification are used to help maintain the integrity of the data.
(i) Identity and describe one method of data verification that can be used when transferring
the data from paper to the computer.
Method ..
Description .
(21
(ii) The company needs to transfer the date of birth of each employee into the computer
system,
Give one example of how each of the following data validation rules can be used to
validate the date of birth when it is entered into the system.
Range check
Presence check .«
Length check
io}
www.RocketRevise.comwww.RocketRevise.com
(iii) Explain why the data in the system may not be correct even after validating and verifying
the data
[Turn over
www.RocketRevise.comwww.RocketRevise.com
2 Draw one line from each security feature to its most appropriate description.
Security feature Description
converts data to an
alternative form
firewall
redirects a user to a fake
website
pharming -
verifies the authenticity of
data
anti-virus software
scans files on the hard drive
for malicious software
encryption
4 accepts or rejects incoming
and outgoing packets based
on criteria
(4)
www.RocketRevise.comwww.RocketRevise.com
6 Data needs to be kept secure when stored on a computer and during transmission over a network.
(a) Explain how a digital signature is used to authenticate a digital document during transmission
over a network.
i}
(b) Complete the table by identifying and describing two types of software that can be installed
on a computer to prevent threats over a network.
Type of software Description
(2
[Turn over.
www.RocketRevise.com